TelcoNews Australia - Telecommunications news for ICT decision-makers

Threat intelligence stories - Page 25

Masked cybercriminal at computer global online phishing operations

Microsoft disrupts RaccoonO365 phishing operation targeting 365 users

Wed, 17th Sep 2025
#
malware
#
ransomware
#
mfa
Microsoft has seized 338 websites linked to RaccoonO365, disrupting a phishing service that stole 5,000 Microsoft 365 credentials across 94 countries.
Realistic illustration shadowy hooded figure computer dark room multiple monitors code dollar bills online fraud

Vane Viper linked to over 1 trillion DNS queries & ad fraud scams

Wed, 17th Sep 2025
#
martech
#
advanced persistent threat protection
#
cybersecurity
Vane Viper, a threat actor posing as an adtech firm, generated over 1 trillion DNS queries last year linked to malware and ad fraud, warns Infoblox.
Interconnected digital chains secure locks ai circuit shields enterprise security

SecurityScorecard acquires HyperComply to boost AI security

Wed, 17th Sep 2025
#
supply chain
#
breach prevention
#
ai
SecurityScorecard has acquired AI-driven HyperComply to enhance supply chain security with faster, automated vendor risk assessments and compliance management.
High tech operations center cybersecurity professionals analyzing threat data ai defense

CrowdStrike & Meta unveil open benchmarks for AI in cyber defence

Tue, 16th Sep 2025
#
advanced persistent threat protection
#
socs
#
ai security
CrowdStrike and Meta have launched CyberSOCEval, new open benchmarks to assess AI performance in real-world cyber defence operations centres.
Digital shield protecting interconnected network human silhouettes identity security

Rubrik expands CrowdStrike integration to boost identity security

Tue, 16th Sep 2025
#
advanced persistent threat protection
#
iam
#
ai security
Rubrik has enhanced its integration with CrowdStrike Falcon to help firms swiftly detect and reverse malicious identity changes, boosting hybrid cyber defence.
Computer screen hidden malicious code image file digital malware shadowy user

Cyber attackers use images & built-in tools to bypass defences

Mon, 15th Sep 2025
#
malware
#
phishing
#
advanced persistent threat protection
HP Wolf Security reveals cyber attackers increasingly use images and legitimate system tools to hide malware, making threats harder to detect and block.
Matthew lowe

How vulnerability management has become a boardroom issue

Mon, 15th Sep 2025
#
siem
#
risk & compliance
#
genai
Vulnerability management is now a critical boardroom priority as Australian firms face tighter cyber regulations and rising digital threats requiring automated, proactive defence.
Digital illustration cloud network cables shields ai analyzing threats

Gigamon unveils AI-powered Insights to boost cloud security & IT

Fri, 12th Sep 2025
#
firewalls
#
ransomware
#
hybrid cloud
Gigamon launches AI-powered Insights to enhance cloud security and IT operations by integrating with AWS, Elastic, and Splunk for faster threat detection and troubleshooting.
Modern security operations center analysts monitoring ai threat maps teamwork

Cisco launches Splunk AI-driven tools to streamline SOC security

Wed, 10th Sep 2025
#
siem
#
advanced persistent threat protection
#
ueba
Cisco unveils two AI-driven editions of Splunk Enterprise Security to streamline SOC operations, boost threat detection, and accelerate incident response globally.
Shadowy hacker using laptop with ghostly code flowing data escape

Stealerium malware surge prompts concern over new attack tactics

Sat, 6th Sep 2025
#
malware
#
advanced persistent threat protection
#
open source
Cybercriminals are increasingly exploiting open-source Stealerium malware to steal sensitive data, prompting warnings from Proofpoint researchers of new attack methods.
Interconnected smart devices cameras sensors industrial security network

Nozomi Networks leads Forrester Wave 2025 for IoT security

Thu, 4th Sep 2025
#
iot security
#
iot
#
advanced persistent threat protection
Nozomi Networks tops Forrester Wave 2025 for IoT security, earning highest scores for AI-driven protection and transparent pricing in current offerings.
Small business office computers cloud shield icons digital protection ai cybersecurity

SentinelOne brings AI-powered security to SMBs via Pax8 launch

Thu, 4th Sep 2025
#
advanced persistent threat protection
#
edr
#
cybersecurity
SentinelOne launches Managed AI Defence on Pax8 cloud marketplace, offering AI-powered cybersecurity to SMBs via MSPs and MSSPs with simple deployment.
Layered digital shields surrounding computers network access protection

Portnox teams with SentinelOne to boost real-time zero trust security

Thu, 4th Sep 2025
#
firewalls
#
endpoint protection
#
network security
Portnox integrates with SentinelOne to combine real-time endpoint security and network access control, enhancing automated zero trust defence for organisations.
Secure cloud infrastructure shield icons server racks network connections

F5 named overall leader in 2025 KuppingerCole WAAP report

Mon, 1st Sep 2025
#
firewalls
#
ddos
#
hybrid cloud
F5 has been named overall leader in the 2025 KuppingerCole report for its advanced Web Application and API Protection solutions across complex multi-cloud environments.
Cloud servers interconnected security breach red glowing server business office

Salesforce data theft campaign exposes SaaS integration risks

Thu, 28th Aug 2025
#
mfa
#
cloud security
#
martech
State-sponsored hackers have stolen OAuth2 tokens from Salesforce integrations, compromising hundreds of organisations and exposing risks in SaaS connectivity.
Fortified digital shield network nodes data streams binary code cybersecurity protection

Check Point named a leader in 2025 Gartner firewall analysis

Thu, 28th Aug 2025
#
firewalls
#
data protection
#
network security
Check Point has been named a Leader in Gartner's 2025 Magic Quadrant for Hybrid Mesh Firewalls, recognised for AI-driven threat prevention and unified security management.
Shield symbol integrated with cloud network elements secure cloud software protection cyber threat detection blocking

AppOmni unveils Zero Trust Bridge to counter SaaS cyberattacks

Thu, 28th Aug 2025
#
saas
#
firewalls
#
network security
AppOmni launches Zero Trust Bridge to help firms counter SaaS attacks by ShinyHunters and UNC6040, enhancing real-time security policy enforcement.
Modern security operations center analysts monitoring network maps threat alerts

AMSYS adopts Conifers platform to scale security services growth

Thu, 28th Aug 2025
#
advanced persistent threat protection
#
socs
#
ai
AMSYS Innovative Solutions adopts Conifers CognitiveSOC platform to scale managed security services and boost efficiency without increasing staff numbers.
Modern corporate data center advanced digital shields firewalls hybrid security

Fortinet named leader in Gartner's 2025 hybrid mesh firewall

Thu, 28th Aug 2025
#
firewalls
#
network infrastructure
#
digital transformation
Fortinet leads Gartner's inaugural 2025 Magic Quadrant for Hybrid Mesh Firewall, achieving top marks for Ability to Execute in hybrid security solutions.
Interconnected digital nodes data streams shield icons cybersecurity protection

CrowdStrike to acquire Onum for Falcon SIEM AI data integration

Thu, 28th Aug 2025
#
endpoint protection
#
siem
#
advanced persistent threat protection
CrowdStrike will acquire Onum to integrate its real-time data pipeline tech with Falcon SIEM, boosting speed, cutting costs, and enhancing autonomous threat detection.